In the last decades, many works have been done to enhance data performances in the computer field. Data performance consists to describe all improvements which can be added to data traffic. More precisely, we are talking about techniques allowing improving the evaluation of big data using machine learning. Data evaluation is composed of several variables such as security, quality of service, data synchronization, scalability, and data structuring. In this work, we complete our proceedings done to supervise the continuity of technological evolution in terms of big data and safety. In other words, we aim to add brick to our previous processes to take into consideration the enhancement of the analysis of the causes generating frauds and intrus...
In this era of Internet ensuring the confidentiality, authentication and integrity of any resource e...
In today’s world there is lots of data requiring automated processing: nobody can analyze and extrac...
Fraud Detection is one of the oldest areas of research. The requirement of an effective system that ...
Network security is one of the foremost anxieties of the modern time. Over the previous years, numer...
The main goal of this research is to contribute to automated performance anomaly detection for large...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
IoT anomalies are typically the result of malicious activity. For example, an attempted network intr...
Abstract: Network-based Intrusion Detection System is a threat caused by the explosion of computer n...
Big Data technologies and machine learning are about to revolutionise the industrial domain in diffe...
Since the turn of the millennium, the volume of data has increased significantly in both industries ...
Database Operating System (DBOS) is a new operating system (OS) framework that replaces the traditio...
This thesis investigates the possibility of using anomaly detection on performance data of virtual s...
An Intrusion Detection Model (IDM) using a Machine Learning (ML) algorithm on a Big Data environment...
The advent of connected devices and omnipresence of Internet have paved way for intruders to attack ...
Nowadays the significant concern in IoT infrastructure is anomaly and attack detection from IoT devi...
In this era of Internet ensuring the confidentiality, authentication and integrity of any resource e...
In today’s world there is lots of data requiring automated processing: nobody can analyze and extrac...
Fraud Detection is one of the oldest areas of research. The requirement of an effective system that ...
Network security is one of the foremost anxieties of the modern time. Over the previous years, numer...
The main goal of this research is to contribute to automated performance anomaly detection for large...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
IoT anomalies are typically the result of malicious activity. For example, an attempted network intr...
Abstract: Network-based Intrusion Detection System is a threat caused by the explosion of computer n...
Big Data technologies and machine learning are about to revolutionise the industrial domain in diffe...
Since the turn of the millennium, the volume of data has increased significantly in both industries ...
Database Operating System (DBOS) is a new operating system (OS) framework that replaces the traditio...
This thesis investigates the possibility of using anomaly detection on performance data of virtual s...
An Intrusion Detection Model (IDM) using a Machine Learning (ML) algorithm on a Big Data environment...
The advent of connected devices and omnipresence of Internet have paved way for intruders to attack ...
Nowadays the significant concern in IoT infrastructure is anomaly and attack detection from IoT devi...
In this era of Internet ensuring the confidentiality, authentication and integrity of any resource e...
In today’s world there is lots of data requiring automated processing: nobody can analyze and extrac...
Fraud Detection is one of the oldest areas of research. The requirement of an effective system that ...